[go: up one dir, main page]

WO2007049972A1 - A method and device for analysis and visualization of a network - Google Patents

A method and device for analysis and visualization of a network Download PDF

Info

Publication number
WO2007049972A1
WO2007049972A1 PCT/NO2006/000379 NO2006000379W WO2007049972A1 WO 2007049972 A1 WO2007049972 A1 WO 2007049972A1 NO 2006000379 W NO2006000379 W NO 2006000379W WO 2007049972 A1 WO2007049972 A1 WO 2007049972A1
Authority
WO
WIPO (PCT)
Prior art keywords
nodes
network
node
subregion
graph
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/NO2006/000379
Other languages
French (fr)
Inventor
Geoffrey Canright
Kenth ENGØ-MONSEN
Åsmund WELTZIEN
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telenor ASA
Original Assignee
Telenor ASA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telenor ASA filed Critical Telenor ASA
Priority to EP06812796A priority Critical patent/EP1946485A1/en
Priority to US12/084,232 priority patent/US20090296600A1/en
Publication of WO2007049972A1 publication Critical patent/WO2007049972A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/22Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them

Definitions

  • the present invention addresses the problem of understanding and controlling the flow of information in networks, with the aim of spreading or preventing spreading of information in said networks .
  • the invention involves analyzing the structure of a given network, based on the measured topology (the nodes of the network and the links between them) .
  • the networks in question may be any kinds of networks, but the invention is particularly applicable in communication networks .
  • SAG steepest-ascent graph
  • a principal objective of the present invention is to provide a method and device for network analysis that solves the shortcomings of prior art methods as mentioned above.
  • the analysis method of the present invention is based on the use of the steepest ascent graph (SAG) .
  • the method according to the present invention for analysis and visualization of a network is as defined in the appended claim 1.
  • the method includes at least the steps of mapping the topology of the network, calculating an Adjacency matrix A of said network, from said Adjacency matrix A extracting a neighbour list for each node in the network, calculating an Eigenvector Centrality (EVC) score for each node, from said neighbour list and EVC score identifying the neighbour of the node with the highest EVC score, and creating a matrix A with entries for each link in the network, in which the entry for a given link is set to 1 if it is a link between a node and its neighbour with the highest EVC score, said matrix A being the Steepest Ascent Graph (SAG) of the network.
  • SAG Steepest Ascent Graph
  • the invention also includes a device, a computer program product and a computer readable medium as claimed in the appended claims .
  • Fig. 1 shows a simple test graph with 16 nodes
  • Fig. 2 shows the same graph with contour lines removed
  • Fig. 3 shows the subregions of the test graph in Fig. 1
  • Fig. 4 shows the sub-subregions obtained by further refinement of the largest subregion in fig. 3
  • Fig. 5 is a schematic tree visualization of the test graph in Fig. 1,
  • Fig. 6 is a visualization of the Gnutella network using prior art technique
  • Fig. 7 shows the steepest-ascent graph of the same network
  • Fig. 8 is another prior art visualization of the Gnutella network, taken at another point in time
  • Fig. 9 is the corresponding visualization using the steepest-ascent approach
  • Fig. 10 shows the graph in Fig. 8, but with the nodes colored according to their region membership
  • Fig. 11 is the subregion visualization for the two-region graph of Fig. 9,
  • Fig. 12 is the same graph with a threshold set for subregion size, i.e. small subregions are not shown,
  • Fig. 13 shows the subregion visualization for the one- region graph of fig. 7, also with a threshold set on subregion size.
  • each region is a 'mountain'
  • the eigenvector centrality (EVC) index of each node is its ⁇ height' .
  • the top of the mountain is called its Center—this is the highest node in the region.
  • EVC eigenvector centrality
  • each subtree represents in fact the set of likeliest paths for information flow between the nodes in the subtree and the Center .
  • This definition also has the obvious advantage that it allows for iterative refinement. Since a subregion is simply a subtree of the SAG, one can readily define sub- subregions as sub-subtrees. That is, one simply moves Mown' the subtree from its head, until the first branching of the subtree. Each branch of the subtree then is defined as a distinct sub-subregion. The extension to even further refinements should be clear from this definition.
  • Figure 1 shows a simple graph with 16 nodes. 'Contour lines' of constant 'height' are also shown. It is clear from the figure that a regions analysis gives two regions— one with 12 nodes on the left, and one with 4 nodes on the right. For each region, the Center node is marked with blue color.
  • Figure 2 shows the same graph, with contour lines removed, and with those links lying on the SAG marked with thick lines. Hence the SAG is clearly visible in Figure 2.
  • Each connected subgraph in Figure 3 is a subregion of the graph of Figure 2.
  • trials with empirically measured (peer-to-peer) networks have indicated that one can find typically a wide variation in the size of the subregions, and that, even with large empirical networks, one-node subregions are not unusual .
  • Figure 3 is typical (except for the small size of the whole graph) of the real networks we have examined so far (these having about 1000 nodes) .
  • the graph of Figure 1 allows for one further step of refinement.
  • refinement consists of removing the head of the subregion, and its links. (If the head has only one neighbor below it, we remove that one also—and so on, until the removed head has multiple neighbors.) There are now three sub-subregions—that is, one for each neighbor of the removed head. The green node is now seen as head of its sub-subregion.
  • the process of refinement is almost completely analogous to the process of defining subregions; also, any further refinements (on larger graphs than that in these Figures) are precisely like the refinement process illustrated here.
  • the present invention solves this problem by giving an algorithm which is optimal in terms of the number of accesses to external memory. That is, our new algorithm reads the neighbor list of each node (which is a column of the adjacency matrix) exactly once. Doing so reduced the running time for our 10-million-node example from (expected) 200 years to 58 hours.
  • the method builds on the insight that steepest ascent from any given node is actually determined by (a) its highest neighbor, plus (b) steepest ascent from this neighbor.
  • the SAG requires finding and storing exactly one link for each node. This link is found after a single access to the node's neighbor list, and stored in a separate data structure for the SAG.
  • calculation of the SAG begins with several input structures.
  • the l's in the i ' th column (or row) of A thus give the node numbers of those nodes which are neighbors of node i; it is in this sense that we say that we can extract the neighbor list of a node from a column of A.
  • Multiplication of s by A sends each node number 'downhill' in the SAG tree—for example, in the above notation, multiplication by A will send the number at Ii to g (and to all other nodes having h as their highest neighbour) .
  • Repeated multiplication by A results in a stable vector s* , where the entry in s* for each node g gives the node number of the Center whose region g belongs to. (In the exceedingly rare case that a node belongs to two regions, it will receive the sum of the node numbers for the two Centers—a case that is easily detected.
  • a modified version of the procedure detailed in the previous paragraph can be used in the calculation of subregions .
  • Tree visualization For Tree visualization we proceed as follows:
  • SAG tree
  • Figure 5 shows the tree visualization for the graph of s Figure 1. This figure is only schematic—that is, we have not used any force balance package to lay out the nodes .
  • tree visualization involves building the SAG (as outline above) , and then simply feeding the SAG as a graph to a force-balance visualization program such as UCINet (UCINet and NetDraw may be 5 downloaded from: http://www.analytictech.com/).
  • UCINet UCINet and NetDraw may be 5 downloaded from: http://www.analytictech.com/).
  • Figure 6 shows a snapshot of the Gnutella peer-to-peer file-sharing network, taken in 2001. It has about 1000 nodes.
  • the visualization in Figure 6 was 0 performed using NetDraw, a component of the network analysis package UCINet. This is thus a state-of-the-art visualization; but it reveals (as is common with large networks) a structureless mess.
  • Figure 7 shows the same graph, laid out again by NetDraw; but the input to NetDraw was the steepest-ascent graph as found by our analysis. We see that our analysis finds only one region; but Figure 7 reveals a rich internal subregion structure for this one region. In fact, many layers of substructure are already visible in Figure 7; and it is clear that refinement of the subregions will only bring out this substructure even more clearly.
  • Figure 8 shows a different Gnutella snapshot, again with about 1000 nodes, again drawn using the full link structure and NetDraw.
  • Figure 9 shows that our analysis finds two regions for this snapshot. Again the contrast (compare Figures 8 and 9) is striking.
  • Figure 10 is the same layout as in Figure 8, but with the nodes colored according to their region membership (as found by our analysis) . The point of Figure 10 is that the two-region structure is partially visible in the layout using the full link structure (assuming one knows how to assign the nodes to regions) .
  • Figure 10 gives some indication of the network' s structure—more than does Figure 8—but Figure 9 shows both the two-region main structure, and many levels of substructure, much more clearly.
  • ⁇ net link strength' (as described in more detail below) between any given pair of subregions, and then use this net link strength to guide in the placement of the subtrees. For example, one can place a fictitious extra link between the respective heads of each pair of subtrees, giving a weight to this link that is determined by the net link strength between the subtrees (subregions) . The force balance method will then tend to drive subtrees towards one another if they have a high net link strength between them.
  • FIG. 4 is (again) a schematic example of one step of refinement, starting from the tree visualization of Figure 3.
  • Subregion visualization The procedure for Subregion visualization is as follows:
  • Subregion visualization requires a few more steps to o explain than does tree visualization. For this reason, we repeat the steps given above, adding further details where appropriate .
  • ⁇ geometric link centrality' g 13 for a link between nodes i and j can be the geometric average of the two nodes' EVC scores:
  • the essential information that we want to include in this invention is that both the node (subregion) size, and the net (inter- subregion) link strength, can and should be displayed in subregion visualization; they are an important part of the total picture of how the subregions are related to one another.
  • the largest ⁇ red' subregion in Figure 11 corresponds to the entire ⁇ lower half of the red region in Figure 9; we know that the lower half is a subregion, because the Center of that region is at the hub of the upper half.
  • the same kind of correspondence may be found for the blue region.
  • the method may be performed in a device including a controller and a storage device.
  • the controller may be realized as a server, and the storage device may be a database controlled by the server.
  • the storage device/database is storing setup information regarding each node in a network.
  • the setup information includes information on the connections/interfaces to/from each node.
  • the device may also be interfaced to the network, and be adapted to retrieve this information from the nodes . In other cases this information must be gathered in other ways, e.g. when the nodes in question not are communication nodes.
  • traffic information may be gathered from each node, such as traffic counts.
  • the method according to the present invention may be implemented as software, hardware, or a combination thereof .
  • a computer program product implementing the method or a part thereof comprises a software or a computer program run on a general purpose or specially adapted computer, processor or microprocessor.
  • the software includes computer program code elements or software code portions that make the computer perform the method using at least one of the steps according to the inventive method.
  • the program may be stored in whole or part, on, or in, one or more suitable computer readable media or data storage means such as a magnetic disk, CD-ROM or DVD disk, hard disk, magneto-optical memory storage means, in RAM or volatile memory, in ROM or flash memory, as firmware, or on a data server.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A method for analysis and visualization of a network is disclosed. The analysis method is based on the use of the steepest ascent graph (SAG). Specifically, the method: (i) uses the SAG to define subregions, in a way that allows iterative refinement; (ii) presents a new and highly efficient way of calculating the SAG; (iii) uses the SAG, and the definitions in (i), as the foundation of a novel method for displaying the structure of the network in a two-dimensional visualization.

Description

A METHOD AND DEVICE FOR ANALYSIS AND VISUALIZATION OF A NETWORK
Field of the invention
The present invention addresses the problem of understanding and controlling the flow of information in networks, with the aim of spreading or preventing spreading of information in said networks . The invention involves analyzing the structure of a given network, based on the measured topology (the nodes of the network and the links between them) . The networks in question may be any kinds of networks, but the invention is particularly applicable in communication networks .
Technical background
There exist many methods for defining well connected clusters in a network; but only the regions-analysis method disclosed in the applicant's earlier Norwegian patent applications NO 20035852 and NO 20053330 has been shown to have direct utility for understanding and controlling spreading of information on the network. Specifically, in NO 20035852 we have presented a basic method for analyzing networks . This method is valid whenever the links of the network may be viewed as symmetric—i . e. , whenever flow of information over a link may (at least approximately) be assumed to be equally likely in either direction on the link. A principal output of this method is the assignment of each node to a region (well connected cluster) of the network. The analysis predicts that information spreading will be relatively faster within regions than between them. Hence knowledge of these regions is useful for controlling the spread of information—that is, either hindering the spread of harmful information (such as computer viruses) or aiding the spread of useful information. Geoffrey Canright and Kenth Engø-Monsen, "Roles in Networks". Science of Computer Programming, 53 (2004) 195—214, is a research article which describes the analysis method in detail.
Geoffrey Canright and Kenth Engø-Monsen. "Spreading on networks: a topographic view" to appear in Proceedings, European Conference on Complex Systems, 2005 (ECCS05) and Geoffrey S. Canright and Kenth Engø-Monsen, "Epidemic spreading over networks: a view from neighbourhoods", Telektronikk 101, 65-85 (2005) are further research articles which demonstrate that our definition of regions is indeed extremely useful for understanding how information is spread over a network. Also, in the last paper mentioned, we present methods for modifying the structure of a given network, towards the goal of either helping or hindering information flow. Results of some limited tests of these design methods are presented, which are also described in the Norwegian patent application NO 20053330. The test results reported in the last paper indicate that design and modification techniques that are based on our regions analysis can significantly affect the rate of information spreading.
One shortcoming of our region analysis method is that there has not so far been found any useful way to refine the analysis, i.e., to define subregions within each region. That is, the method allows one to sort the nodes of the networks into a number of regions, defined by their being well connected internally. However, the number of such regions is determined by the analysis, and hence is not subject to any choice by the user of the analysis. Also, for a sufficiently well connected network, the method can give the answer that the network is composed of a single region. Thus, if a user of this approach wishes to examine smaller subregions than those given by the analysis, new methods are needed. In many cases, it is desirable to be able to iteratively refine the analysis, defining sub- subregions , etc. M. Girvan and M. Newman, "Community structure in social and biological networks", Proc . Natl. Acad. Sci . USA, 99 (2002), pp. 8271-8276 describes a method for network analysis which also breaks down a given network into well connected clusters. The Girvan-Newman method has the advantage that the breakdown may be refined as many times as wished, giving subregions, sub-subregions , etc. However, the Girvan-Newman method has no demonstrated connection to the important practical problem of understanding the spreading of information.
Another shortcoming of the region analysis method as described in NO 20035852 is that it can be too demanding in terms of computing power when handling large graphs . An important technical aspect of the regions-analysis method is the calculation of the steepest-ascent graph (SAG) for a given network. This graph is used to assign nodes uniquely to regions . We have discovered, in working with multi- million-node graphs, that it is important to be able to calculate this SAG in an efficient manner. Specifically, we found that an ordinary approach to calculating the SAG in such cases might take several hundred years to complete- thus rendering the whole approach practically impossible.
Finally, we note that a highly desirable feature of any method of network analysis is the possibility for visualizing the resulting structure (as given by the analysis) . There has been, and continues to be, a huge volume of work on the problem of visualizing networks . However, the problem of finding a good visualization which presents our λregional' view of a network is largely unsolved.
An overview of current techniques for visualization og graphs may be found in Giuseppe Di Battista, Peter Eades, Roberto Tamassia, and Ioannis G. Tollis, Graph Drawing: Algorithms for the Visualization of Graphs, Prentice Hall PTR, Upper Saddle River, NJ, USA (1998) . Summary of the invention
Thus, a principal objective of the present invention is to provide a method and device for network analysis that solves the shortcomings of prior art methods as mentioned above. The analysis method of the present invention is based on the use of the steepest ascent graph (SAG) .
The method according to the present invention for analysis and visualization of a network, said network including a number of nodes inter-connected by links, is as defined in the appended claim 1. Specifically, the method includes at least the steps of mapping the topology of the network, calculating an Adjacency matrix A of said network, from said Adjacency matrix A extracting a neighbour list for each node in the network, calculating an Eigenvector Centrality (EVC) score for each node, from said neighbour list and EVC score identifying the neighbour of the node with the highest EVC score, and creating a matrix A with entries for each link in the network, in which the entry for a given link is set to 1 if it is a link between a node and its neighbour with the highest EVC score, said matrix A being the Steepest Ascent Graph (SAG) of the network.
The invention also includes a device, a computer program product and a computer readable medium as claimed in the appended claims .
Brief description of the drawings
The invention will now be given a detailed description, in reference to the appended drawings, in which:
Fig. 1 shows a simple test graph with 16 nodes,
Fig. 2 shows the same graph with contour lines removed,
Fig. 3 shows the subregions of the test graph in Fig. 1, Fig. 4 shows the sub-subregions obtained by further refinement of the largest subregion in fig. 3,
Fig. 5 is a schematic tree visualization of the test graph in Fig. 1,
Fig. 6 is a visualization of the Gnutella network using prior art technique,
Fig. 7 shows the steepest-ascent graph of the same network,
Fig. 8 is another prior art visualization of the Gnutella network, taken at another point in time,
Fig. 9 is the corresponding visualization using the steepest-ascent approach,
Fig. 10 shows the graph in Fig. 8, but with the nodes colored according to their region membership,
Fig. 11 is the subregion visualization for the two-region graph of Fig. 9,
Fig. 12 is the same graph with a threshold set for subregion size, i.e. small subregions are not shown,
Fig. 13 shows the subregion visualization for the one- region graph of fig. 7, also with a threshold set on subregion size.
Detailed description
Defining subregions and refining
We invoke our topographic picture in order to describe the ideas behind this invention. In this picture, each region is a 'mountain' , and the eigenvector centrality (EVC) index of each node is its ^height' . For each region, the top of the mountain is called its Center—this is the highest node in the region. We then note that the steepest-ascent graph gives a picture of the λridge' structure of the mountain. That is, each link which is retained in the steepest-ascent graph is a link from a node to that node's highest (in EVC) neighbor. These links thus represent the likeliest path for information flow towards or from the Center of the region. Furthermore, there is one such λridge line' (including lower branches) for each neighbor of the Center.
Hence we define a subregion as simply that branch of the SAG (which is a tree) which ends at one neighbor of the Center. That is, each neighbor of the Center sits at the head of a subtree of the SAG tree; and we identify each subtree as a subregion. This definition is not arbitrary, since each subtree represents in fact the set of likeliest paths for information flow between the nodes in the subtree and the Center .
This definition also has the obvious advantage that it allows for iterative refinement. Since a subregion is simply a subtree of the SAG, one can readily define sub- subregions as sub-subtrees. That is, one simply moves Mown' the subtree from its head, until the first branching of the subtree. Each branch of the subtree then is defined as a distinct sub-subregion. The extension to even further refinements should be clear from this definition.
We illustrate the definition of subregions with an example. Figure 1 shows a simple graph with 16 nodes. 'Contour lines' of constant 'height' are also shown. It is clear from the figure that a regions analysis gives two regions— one with 12 nodes on the left, and one with 4 nodes on the right. For each region, the Center node is marked with blue color. Figure 2 shows the same graph, with contour lines removed, and with those links lying on the SAG marked with thick lines. Hence the SAG is clearly visible in Figure 2.
Now we define the subregions for each region. For each region, we remove the Centers, and all links connected to them. Those nodes that were neighbors of a Center are now Λheads' of their subregion. These nodes are colored black (see Figure 3) . Nodes which are at the 'leaves' of the tree, ie at the end of a chain of links, are still red. Nodes which are both head and leaf (because they represent a one-node subregion) are black/red. Finally, there is a green node which is neither head nor leaf.
Each connected subgraph in Figure 3 is a subregion of the graph of Figure 2. Thus we find that there is one subregion with six nodes, one with two nodes, and six subregions with only one node. We note that trials with empirically measured (peer-to-peer) networks have indicated that one can find typically a wide variation in the size of the subregions, and that, even with large empirical networks, one-node subregions are not unusual . Hence Figure 3 is typical (except for the small size of the whole graph) of the real networks we have examined so far (these having about 1000 nodes) .
The graph of Figure 1 allows for one further step of refinement. We illustrate this in Figure 4, in which we refine the largest subregion of the graph. Refinement consists of removing the head of the subregion, and its links. (If the head has only one neighbor below it, we remove that one also—and so on, until the removed head has multiple neighbors.) There are now three sub-subregions— that is, one for each neighbor of the removed head. The green node is now seen as head of its sub-subregion. The process of refinement is almost completely analogous to the process of defining subregions; also, any further refinements (on larger graphs than that in these Figures) are precisely like the refinement process illustrated here.
Efficient calculation of the steepest-ascent graph
As noted earlier, we found that applying a straightforward algorithm for finding the SAG gave a projected running time of about 200 years for a test graph with 10 million nodes. The problem here was that the entire test graph did not fit in the fast (RAM) memory of a machine with 4GB of RAM. Hence we had to resort to vexternal-memory' algorithms, i.e. approaches which only read in a part of the problem at a time, operate on that part, delete it, and then read in the next part. (For a reference on external memory algorithms, see: External Memory Algorithms, pub. American Mathematical Society, Jan 1, 1999.) Running time is then strongly constrained by the number of read operations for external memory—these operations are many times (orders of magnitude) slower than access times for RAM.
The present invention solves this problem by giving an algorithm which is optimal in terms of the number of accesses to external memory. That is, our new algorithm reads the neighbor list of each node (which is a column of the adjacency matrix) exactly once. Doing so reduced the running time for our 10-million-node example from (expected) 200 years to 58 hours.
The method builds on the insight that steepest ascent from any given node is actually determined by (a) its highest neighbor, plus (b) steepest ascent from this neighbor. In' other words, for each node, we need only find—once and for all—its single highest neighbor (if there is one—otherwise it is a Center, i.e. a local maximum). Thus, for each node, we find and store that one piece of information, and forget all other links. In short, the SAG requires finding and storing exactly one link for each node. This link is found after a single access to the node's neighbor list, and stored in a separate data structure for the SAG.
In detail, calculation of the SAG begins with several input structures. First of all, we need the adjacency matrix A expressing the topology of the graph (A±j = 1 if there is a link between nodes i and j, and 0 otherwise) . The l's in the i ' th column (or row) of A thus give the node numbers of those nodes which are neighbors of node i; it is in this sense that we say that we can extract the neighbor list of a node from a column of A.
We also need a vector e giving the eigenvector centrality (EVC) score ej_ for each node i. We then use the neighbor list of a given node g, and the EVC scores of these neighbors (taken from the vector e) , in order to find the single neighbor Ji of g that has the highest EVC score. We store this result in a new matrix A1 by placing a 1 at the entry Agh. The matrix A is in fact the steepest-ascent graph (SAG) . It is highly sparse, since it has only one link for each node. Hence it is much more feasible to store all of A in RAM than it is to store all of A (which is typically, in terms of storage requirements, 10—20 times as large as A) . Of course, one need store only the l's for any sparse, binary matrix, such as A or A; but still the former has many more l's than the latter.
The efficiency of this method, in terms of number of read access events for columns of A, is clear. A naϊve approach would pick a node g, and then find its highest neighbor h, then find h' s highest neighbor, and so on, until a Center is reached. This naϊve approach gives immediate region membership information for each chosen node g; but it clearly requires many more read access events in the case that A is externally stored. Our method, instead, defers determination of region membership until the entire SAG is stored in A. One then determines region membership as follows. One builds a start vector s, such that Si = i. That is, one simply places the node number at that node's entry. Multiplication of s by A sends each node number 'downhill' in the SAG tree—for example, in the above notation, multiplication by A will send the number at Ii to g (and to all other nodes having h as their highest neighbour) . Repeated multiplication by A results in a stable vector s* , where the entry in s* for each node g gives the node number of the Center whose region g belongs to. (In the exceedingly rare case that a node belongs to two regions, it will receive the sum of the node numbers for the two Centers—a case that is easily detected. ) We note that only a few multiplications by A are needed, as the s vector converges exactly to s* after a number of multiplications equal to the radius of the largest region (measured in number of hops) . Typical graphs, even very large graphs, have small radii due to 'small worlds' effects.
A modified version of the procedure detailed in the previous paragraph can be used in the calculation of subregions . First the SAG must be updated in two ways: i) Remove the centre node from the tree, causing the SAG to decompose into a number of separate trees, and ii) add self-referencing links to the new root node for each new tree. Subregion membership is then determined by the same procedure given above, applied to each separate tree.
Visualization
We describe two methods for visualising the structure of a network, based on the analysis method presented here. We call these two methods ΛTree visualization' and 'Subregion visualization' respectively.
Tree visualization For Tree visualization we proceed as follows:
1. First consider each region as an isolated subgraph, ie, ignore inter-region ( λbridge' ) links.
2. Find the SAG for each region separately.
3. Use freely available force-balance packages to display the resulting tree structures on the screen. For multiple regions, one can display multiple trees.
4. One can also calculate a λnet link strength' between any given pair of subregions—either from the same o region, or from distinct regions. One can then use this net link strength to determine which subregions (subtrees) should lie closest to one another in the tree (SAG) representing one region.
Figure 5 shows the tree visualization for the graph of s Figure 1. This figure is only schematic—that is, we have not used any force balance package to lay out the nodes .
A practical approach to tree visualization is outlined above. Our approach uses freely available software to actually lay out the nodes in the plane; the new idea o simply comes from discarding all links other than those in the SAG. In other words, tree visualization involves building the SAG (as outline above) , and then simply feeding the SAG as a graph to a force-balance visualization program such as UCINet (UCINet and NetDraw may be 5 downloaded from: http://www.analytictech.com/).
We offer more realistic examples of tree visualization in Figures 6—10. Figure 6 shows a snapshot of the Gnutella peer-to-peer file-sharing network, taken in 2001. It has about 1000 nodes. The visualization in Figure 6 was 0 performed using NetDraw, a component of the network analysis package UCINet. This is thus a state-of-the-art visualization; but it reveals (as is common with large networks) a structureless mess.
Figure 7 shows the same graph, laid out again by NetDraw; but the input to NetDraw was the steepest-ascent graph as found by our analysis. We see that our analysis finds only one region; but Figure 7 reveals a rich internal subregion structure for this one region. In fact, many layers of substructure are already visible in Figure 7; and it is clear that refinement of the subregions will only bring out this substructure even more clearly.
Figure 8 shows a different Gnutella snapshot, again with about 1000 nodes, again drawn using the full link structure and NetDraw. Figure 9 shows that our analysis finds two regions for this snapshot. Again the contrast (compare Figures 8 and 9) is striking. Figure 10 is the same layout as in Figure 8, but with the nodes colored according to their region membership (as found by our analysis) . The point of Figure 10 is that the two-region structure is partially visible in the layout using the full link structure (assuming one knows how to assign the nodes to regions) . Hence Figure 10 gives some indication of the network' s structure—more than does Figure 8—but Figure 9 shows both the two-region main structure, and many levels of substructure, much more clearly.
There are many subregions for the single region in Figure 7, and for each of the two regions in Figure 9. Clearly, for a tree structure, all subregions should radiate outwards from the center; but there is no obviously best criterion for determining which subregions are 'neighbors' as they are laid out in a ring around the Center. The layouts shown in these two figures used the simple, standard mechanism of force-balance algorithms that every node has a degree of repulsion with respect to every other. Thus the force balance itself was allowed to determine the radial ordering of the subregions . We see that the results of using this simple default method are good.
It is also possible to use more information to guide the radial ordering of the subtrees . One can define and calculate a measure of λnet link strength' (as described in more detail below) between any given pair of subregions, and then use this net link strength to guide in the placement of the subtrees. For example, one can place a fictitious extra link between the respective heads of each pair of subtrees, giving a weight to this link that is determined by the net link strength between the subtrees (subregions) . The force balance method will then tend to drive subtrees towards one another if they have a high net link strength between them.
We note that the use of net link strength may have an advantage with very large graphs. That is, for very large graphs, even the SAG tree structure may be too time consuming to lay out with force balancing. In such a case, using extra inter-head links, with a high link weight compared to the SAG links, is likely to speed up convergence—perhaps considerably .
Methods for calculating net link strength will be given in the next subsection, since this quantity plays a crucial role in subregion visualization.
Finally, we emphasize that tree visualization is readily suited for displaying refinements of the subregions . Refinement of a given subregion picture simply gives a new set of subtrees, which may then be handled precisely as for the case of multiple trees from multiple regions. Figure 4 is (again) a schematic example of one step of refinement, starting from the tree visualization of Figure 3.
Subregion visualization The procedure for Subregion visualization is as follows:
1. First consider each region as an isolated subgraph, i.e., ignore inter-region ('bridge') links.
2. Find the SAG for each region separately.
3. For each subregion, determine its size (number of nodes) .
4. Choose a threshold size T. Subregions of size smaller than T are not displayed, to save clutter. All subsequent steps apply only to subregions of size > T.
5. For each SAG, calculate the net link strength between each pair of subregions .
6. Remove the Center of each region, so that the subregions are decoupled from one another at the Center. Their only remaining coupling is then the pairwise couplings formed by the net inter-subregion link strength; and the resulting structure is no longer a tree .
7. For each region, build a Λcoarse-grained graph' by representing each subregion as a single node, and 0 using the inter-subregion net link strengths as the links. Display the resulting coarse-grained graphs for each region, using a freely available force-balance package. The displayed size of the nodes in the coarse-grained graphs may be used to indicate the size 5 (number of actual nodes) for the corresponding subregion; and the net link strengths may be displayed using the thickness of the displayed links in the coarse-grained graph.
Subregion visualization requires a few more steps to o explain than does tree visualization. For this reason, we repeat the steps given above, adding further details where appropriate .
1. First consider each region as an isolated subgraph, ie, ignore inter-region ( λbridge' ) links.
2. Find the SAG for each region separately.
3. For each subregion, determine its size (number of nodes ) .
These three steps are clear.
4. Choose a threshold size T. Subregions of size smaller than T are not displayed, to save clutter. All subsequent steps apply only to subregions of size > T.
It is always useful in visualization to be able to choose a level of resolution, i.e., the level of detail that one wishes to have displayed. Subregion visualization already removes much detail by simply displaying each subregion as a single node. However there can be very large variation in the size of the subregions. For example, the graph of Figure 7 yields subregions of size ranging from 1 to about 350—with a large number of tiny subregions, and only a few large ones. Furthermore, we expect this kind of distribution to be typical of many real networks . Hence it can be desirable to suppress the display of the many tiny subregions , and focus on the large ones .
5. For each SAG, calculate the net link strength between each pair of subregions .
In principle, there are many ways to define this net link strength. We give here a formula, based on two ideas: (i) links with high EVC get more weight; (ii) many links give more weight than few links . To implement these two ideas, we define the ^arithmetic link centrality' for a link between nodes i and j to be the arithmetic average of the two nodes' EVC scores:
(e,+e.)
(D
Alternatively, one can define the ^geometric link centrality' g13 for a link between nodes i and j to be the geometric average of the two nodes' EVC scores:
We then define the net link strength between two subregions α and β to be the sum of the link centralities for all links connecting α and β. This gives
Figure imgf000017_0001
)
We note finally that one can violate the instruction in step 1, for graphs with multiple regions. That is, an even more thorough overview may be obtained by calculating, and including the effects of, all inter-subregion net link strengths—both those between subregions in the same region, and those between subregions in different regions. [Formula (2) is equally valid for a pair of subregions taken from two distinct regions.] This will allow the resulting display to take into account inter-regional relations, so that the final layout reflects most clearly the whole set of relationships. Our default choice is however to treat each region separately.
6. Remove the Center of each region, so that the subregions are decoupled from one another at the Center. Their only remaining coupling is then the pairwise couplings formed by the net inter-subregion link strength; and the resulting structure is no longer a tree. Here we see that the subregions are now treated as individual nodes (as far as visualization is concerned) . They have a λsize' (from step 3) , and they have internode links with link strengths given as detailed in step 5. The Center is removed as it does -not belong to any subregion; and the aim of subregion visualization is to try to display the subregions (only) and their relationship to one another .
Thus we end up with a visualization problem with S nodes (for S subregions of size > T) , and, in general, links of some strength between most pairs of nodes. Thus our coarsegrained graph is in fact a dense graph—it is not sparse, since most of the possible links are present. However, two aspects make this visualization problem much easier than the problem of visualizing the entire network. First, the number S of subregions for a given region is guaranteed to be very much smaller than the number N of nodes in the graph—it is not more than the number of neighbors for the Center of the region (a number much less than N already) , and is likely to be much smaller than even that number, if the threshold size T is set to exclude many small subregions . Secondly, there is likely to be large differences in the various net link strengths in the resulting dense graph. These differences make convergence in the force-balance method much easier than it would be if all links had the same, or nearly the same, strength.
7. For each region, build a 'coarse-grained graph' by representing each subregion as a single node and using the inter-subregion net link strengths as the links. Display the resulting coarse-grained graphs for each region, using a freely available force-balance package. The node size in the coarse-grained graphs may be used to indicate the number of nodes for the corresponding subregion; and the net link strengths may be displayed using the thickness of the displayed links in the coarse-grained graph. All of the techniques needed for this step are publicly- available. There are of course other ways (eg, colors) to indicate scalar measures of node size and link strength. We do not exclude any such method here. The essential information that we want to include in this invention is that both the node (subregion) size, and the net (inter- subregion) link strength, can and should be displayed in subregion visualization; they are an important part of the total picture of how the subregions are related to one another.
Figure 11 shows the subregion visualization for the two- region graph of Figure 9, with threshold T = 1—that is, all subregions are shown. For comparison, in Figure 12 we have set T = 10. The reduction in clutter is significant. We note that it is not trivially easy to find correspondences between subregion structures in Figure 9 and those in Figure 11 or 12. We believe that this is because each type of visualization emphasizes different, but useful, structural information about the network under study. That is, the two methods are complementary, rather than redundant .
Some main features can however be found to correspond. For example, the largest Λred' subregion in Figure 11 corresponds to the entire λlower half of the red region in Figure 9; we know that the lower half is a subregion, because the Center of that region is at the hub of the upper half. The same kind of correspondence may be found for the blue region.
For completeness, we show in figure 13 the subregion visualization for the one-region graph of Figure 7, with T = 10. Here again we see one very large subregion, corresponding to the λupper half of Figure 7.
There are many conceivable applications of the inventive method. We list several here: • Analysis and improvement of information flow in organizations
• Systems for supporting other kinds of social networks, e.g. online communities
• Security for computer networks, e.g. virus control
• Novel strategies for controlling the spreading of diseases among animals and humans
• Limiting the spread of damage in technological networks , for example power networks
The method may be performed in a device including a controller and a storage device. The controller may be realized as a server, and the storage device may be a database controlled by the server. The storage device/database is storing setup information regarding each node in a network. The setup information includes information on the connections/interfaces to/from each node. The device may also be interfaced to the network, and be adapted to retrieve this information from the nodes . In other cases this information must be gathered in other ways, e.g. when the nodes in question not are communication nodes. For communication nodes, traffic information may be gathered from each node, such as traffic counts.
The method according to the present invention may be implemented as software, hardware, or a combination thereof . A computer program product implementing the method or a part thereof comprises a software or a computer program run on a general purpose or specially adapted computer, processor or microprocessor. The software includes computer program code elements or software code portions that make the computer perform the method using at least one of the steps according to the inventive method. The program may be stored in whole or part, on, or in, one or more suitable computer readable media or data storage means such as a magnetic disk, CD-ROM or DVD disk, hard disk, magneto-optical memory storage means, in RAM or volatile memory, in ROM or flash memory, as firmware, or on a data server.
It will be understood by those skilled in the art that various modifications and changes may be made to the present invention without departure from the scope thereof, which is defined by the appended claims .

Claims

Claims
1. A method for analysis and visualization of a network, said network including a number of nodes inter-connected by links , c h a r a c t e r i z e d i n the following steps :
• mapping the topology of the network,
• calculating an Adjacency matrix A of said network,
• from said Adjacency matrix A extracting a neighbour list for each node in the network,
• calculating an Eigenvector Centrality (EVC) score for each node,
• from said neighbour list and EVC score identifying the neighbour of the node with the highest EVC score,
• creating a matrix A with entries for each link in the network, in which the entry for a given link is set to
1 if it is a link between a node and its neighbour with the highest EVC score, said matrix A being the Steepest Ascent Graph (SAG) of the network.
2. A method as claimed in claim 1, said method including the additional steps of:
• multiplying a start vector s±=i, i being the node number, with a Steepest Ascent Graph of the network expressed as a matrix A;
• iterating this multiplicative step until the start vector s converges to a stable vector s* ;
• reading off the region membership of each node from s*.
3. A method as claimed in claim 2 , said method including the additional steps of:
• identifying nodes which are local maxima of the Steepest Ascent Graph as center nodes,
• grouping the nodes into regions surrounding each identified center node,
• removing said center nodes and the links to said center nodes from the Steepest Ascent Graph,
• identifying neighboring nodes of said center nodes as o head nodes ,
• grouping nodes into subregions surrounding each identified head node, the nodes of a subregion being linked to the head node of that subregion in the Steepest Ascent Graph.
s
4. A method as claimed in claim 3 , said method including the additional steps of:
• identifying neighboring nodes of said head nodes as sub-subregion head nodes,
• grouping nodes into sub-subregions surrounding each o identified sub-subregion head node, the nodes of a sub-subregion being linked to the sub-subregion head node in the Steepest Ascent Graph.
5. A method as claimed in claim 3 , said method including the additional steps of:
5 • identifying regions in said network,
• calculating a Steepest Ascent Graph for each region separately, • displaying one or more of the Steepest Ascent Graphs on a display unit using force-balancing.
6. A method as claimed in claim 3 , said method including the additional steps of:
• identifying regions and center nodes in said network,
• calculating a Steepest Ascent Graph for each region separately,
• identifying subregions in said network,
• determining the size of each subregion,
• selecting a threshold size T,
• removing subregions smaller than said threshold size T from the graphs,
• for each graph calculating the net link strength between each pair of subregions ,
• removing the center node from each region,
• building a coarse-grained graph in which each subregion is represented as a single node using inter-subregion net link strengths as links,
• displaying the coarse-grained graphs for each region on a display unit using force-balancing.
7. A device for analysis and visualization of a network, said network including a number of nodes inter-connected by links , c h a r a c t e r i z e d i n that the device includes a controller and a storage, the database being adapted to receive setup information for said nodes, the controller being adapted to
• map the topology of the network from said setup information,
• calculate an Adjacency matrix A of said network,
• from said Adjacency matrix A extract a neighbour list for each node in the network,
• calculate an Eigenvector Centrality (EVC) score for each node,
• from said neighbour list and EVC score identify the neighbour of the node with the highest EVC score, and
• create a matrix A with entries for each link in the network, in which the entry for a given link is set to 1 if it is a link between a node and its neighbour with the highest EVC score, said matrix A being the Steepest Ascent Graph (SAG) of the network.
8. A device as claimed in claim 7, wherein the device includes an interface against said network, the device being adapted to retrieve setup information from said nodes .
9. A device as claimed in claim 8, wherein the device is adapted to retrieve traffic data from said nodes .
10. A computer program product comprising computer code means and/or software code portions for making a processor perform the steps of any of the claims 1-6.
11. A computer program product as claimed in claim 10 supplied via a network, such as Internet.
12. A computer readable medium, containing a computer program product as claimed in claim 10 or 11.
PCT/NO2006/000379 2005-10-28 2006-10-27 A method and device for analysis and visualization of a network Ceased WO2007049972A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP06812796A EP1946485A1 (en) 2005-10-28 2006-10-27 A method and device for analysis and visualization of a network
US12/084,232 US20090296600A1 (en) 2005-10-28 2006-10-27 Method and Device for Analysis and Visualization of a Network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NO20055034 2005-10-28
NO20055034A NO323257B1 (en) 2005-10-28 2005-10-28 Methods for analyzing the structure of a network

Publications (1)

Publication Number Publication Date
WO2007049972A1 true WO2007049972A1 (en) 2007-05-03

Family

ID=35432863

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/NO2006/000379 Ceased WO2007049972A1 (en) 2005-10-28 2006-10-27 A method and device for analysis and visualization of a network

Country Status (4)

Country Link
US (1) US20090296600A1 (en)
EP (1) EP1946485A1 (en)
NO (1) NO323257B1 (en)
WO (1) WO2007049972A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009096793A1 (en) * 2008-02-01 2009-08-06 Telenor Asa Analysis and visualization of a network
CN101887573A (en) * 2010-06-11 2010-11-17 北京邮电大学 Method and system for social network clustering association analysis based on core points
US20140201339A1 (en) * 2011-05-27 2014-07-17 Telefonaktiebolaget L M Ericsson (Publ) Method of conditioning communication network data relating to a distribution of network entities across a space
KR20230019715A (en) * 2021-08-02 2023-02-09 국방과학연구소 Method and apparatus for visualizing network topology

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8514226B2 (en) * 2008-09-30 2013-08-20 Verizon Patent And Licensing Inc. Methods and systems of graphically conveying a strength of communication between users
US9389750B2 (en) * 2008-11-30 2016-07-12 Lenovo (Singapore) Pte. Ltd. Wireless interface for access connections
US9148763B2 (en) * 2010-07-30 2015-09-29 Qualcomm Incorporated Methods and apparatuses for mobile station centric determination of positioning assistance data
US8868712B2 (en) 2012-02-06 2014-10-21 Ca, Inc. Effective visualization of an information technology environment through social scoring
WO2015098311A1 (en) * 2013-12-26 2015-07-02 ソニー株式会社 Information processing device, information processing method, and program
TWI806069B (en) * 2019-05-17 2023-06-21 日商愛酷賽股份有限公司 Cluster analysis method, cluster analysis system, and cluster analysis program
CN114036700B (en) * 2021-10-27 2022-07-01 中南大学 A Layout Method of Network Assets Graph

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005064850A1 (en) * 2003-12-30 2005-07-14 Telenor Asa A method for managing networks by analyzing connectivity

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6744768B2 (en) * 1999-07-14 2004-06-01 Telefonaktiebolaget Lm Ericsson Combining narrowband applications with broadband transport
JP4543644B2 (en) * 2003-09-16 2010-09-15 富士ゼロックス株式会社 Data recognition device
WO2006044017A2 (en) * 2004-08-13 2006-04-27 Jaguar Bioscience Inc. Systems and methods for identifying diagnostic indicators

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005064850A1 (en) * 2003-12-30 2005-07-14 Telenor Asa A method for managing networks by analyzing connectivity

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CANRIGHT G ET AL: "Roles in networks", SCIENCE OF COMPUTER PROGRAMMING, ELSEVIER SCIENCE PUBLISHERS BV., AMSTERDAM, NL, vol. 53, no. 2, November 2004 (2004-11-01), pages 195 - 214, XP004566812, ISSN: 0167-6423 *
CANRIGHT G S ET AL: "Epidemic spreading over networks - A view from neighbourhoods", TELEKTRONIKK, XX, XX, vol. 1, no. 2005, 1 April 2005 (2005-04-01), pages 65 - 86, XP002403245, ISSN: 0085-7130 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009096793A1 (en) * 2008-02-01 2009-08-06 Telenor Asa Analysis and visualization of a network
WO2009096799A3 (en) * 2008-02-01 2009-09-24 Telenor Asa Analysis and visualization of a network
CN101887573A (en) * 2010-06-11 2010-11-17 北京邮电大学 Method and system for social network clustering association analysis based on core points
US20140201339A1 (en) * 2011-05-27 2014-07-17 Telefonaktiebolaget L M Ericsson (Publ) Method of conditioning communication network data relating to a distribution of network entities across a space
KR20230019715A (en) * 2021-08-02 2023-02-09 국방과학연구소 Method and apparatus for visualizing network topology
KR102748054B1 (en) * 2021-08-02 2024-12-27 국방과학연구소 Method and apparatus for visualizing network topology

Also Published As

Publication number Publication date
US20090296600A1 (en) 2009-12-03
EP1946485A1 (en) 2008-07-23
NO323257B1 (en) 2007-02-19
NO20055034D0 (en) 2005-10-28

Similar Documents

Publication Publication Date Title
NO321340B1 (en) Method of managing networks by analyzing connectivity
Rautiainen et al. GraphAligner: rapid and versatile sequence-to-graph alignment
CN102882973B (en) Distributed load balancing system and distributed load balancing method based on peer to peer (P2P) technology
US20090296600A1 (en) Method and Device for Analysis and Visualization of a Network
CN106209989B (en) Spatial data concurrent computational system and its method based on spark platform
CN109067725A (en) Network flow abnormal detecting method and device
EP1443721B1 (en) Distributed router for dynamically managing forwarding information and method thereof
CN102388387A (en) Access-control-policy template generating device, and system, method and program thereof
CN109218304B (en) A network risk blocking method based on attack graph and co-evolution
Li et al. Identifying overlapping communities in social networks using multi-scale local information expansion
CN104615701B (en) The embedded big data visualization engine cluster in smart city based on video cloud platform
CN115622903A (en) A Calculation Method of Node Importance in Telecommunication Network Based on Network Structure
CA2486657A1 (en) Method for organizing and querying genomic and proteomic databases
Jaouadi et al. A distributed model for sampling large scale social networks
Arge et al. Skip-webs: efficient distributed data structures for multi-dimensional data sets
CN115641910A (en) Third-generation group genome structure variation joint detection method
Houck et al. Utilizing Lamarckian evolution and the Baldwin effect in hybrid genetic algorithms
CN113157384B (en) Dynamic migration defense method and system for virtual machine
CN112464040B (en) Graph structure recognition, visual display and display operation method and device
CN104869044B (en) A kind of virtual net mapping method and device
Melián et al. Diversification and biodiversity dynamics of hot and cold spots
CN108366048B (en) Network intrusion detection method based on unsupervised learning
CN110532232A (en) Method and device for processing uploaded pictures
Walve et al. Kermit: linkage map guided long read assembly
Singh et al. The Politics of Routing: Investigating the Relationship between {AS} Connectivity and Internet Freedom

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2006812796

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 12084232

Country of ref document: US